A high-risk issue is discovered during an information security risk assessment of a legacy application. The business is unwilling to allocate the resources to remediate the issue. Which of the following would be the information security manager’s BEST course of action?
Salilgen
Highly Voted 11 months, 4 weeks agoHN2025
Most Recent 1 month agod7a2ba6
2 months, 2 weeks agoATT5832
3 months, 1 week agoInfosecnerd
6 months, 1 week agoyottabyte
11 months, 1 week agoPOWNED
1 year, 1 month agosecdoc
1 year, 5 months agoKunzle
1 year, 5 months agoMarcelus1714
1 year agoMarcelus1714
1 year agoMacDanorld
1 year, 5 months agooluchecpoint
1 year, 5 months agoGoseu
1 year, 7 months agorichck102
1 year, 8 months agodark_3k03r
1 year, 10 months agoCarlPTY07
1 year, 11 months agocangurer
1 year, 11 months agoBroesweelies
2 years, 1 month agoMyKasala
2 years, 1 month ago